Security of Computer Operations

  • Ken Slater


As computer operations become more diverse, distributed and complex the varieties of threats have increased. Although the more technical security breaches may now often be generated many miles from the main computer installation, using communications technology, they are still likely to be directed at data or software held and processed in the centre, and their chance of success will depend on the level of control over the computer installation.


Computer Operation Preventive Maintenance Operating Instruction Data Control Group Maintenance Contract 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

Copyright information

© Touche Ross Management Consultants 1991

Authors and Affiliations

  • Ken Slater

There are no affiliations available

Personalised recommendations